The Louisville Leader was an African-American newspaper published from 1917 to 1950 by I. Willis Cole in Louisville, Kentucky. This issue is twelve pages. There are significant portions missing from the side of each page of this issue.

The seventeenth issue of the Louisville fanzine commonly known as the Burt. Includes record reviews, live show reviews, horoscope and other commentary. Please be advised that this magazine may contain images, language, and themes that may be...

This dissertation takes Chinese advertisements as the research subjects to see in what way a quantifiable large number of advertisements with its metaphorical nature and instrumental mission can reflect social cultural change, in specifics,...

Many important applications require the discovery of items which have occurred frequently. Knowledge of these items is commonly used in anomaly detection and network monitoring tasks. Effective solutions for this problem focus mainly on reducing...

Breast cancer is a complex disease that involves genetic, epigenetic, and environmental components. High and moderate penetrant genes have been identified that affect risk to developing breast cancer; however, these risk alleles are present in a...

Since 2001, the Federal government has invested approximately $10 billion to expand broadband infrastructure throughout the nation, including various loan programs and grants authorized through Farm Bills and, more recently, the American Recovery...

S. Parkes Cadman (1864-1936), a Christian minister at Central Congregational Church in Brooklyn, New York from 1901 to 1936, was a popular religious figure in interwar America. From 1924 to 1928, Cadman served as president of the Federal Council of...

Materials that change shape or dimensions in response to external stimuli are widely used in actuation devices. While plenty of systems respond to heat, light, electricity, and magnetism, there is an emerging class of light-driven actuators based...

Electronic communication is gradually becoming a larger part of today's
society. This type of communication not only encompasses ways people stay in
touch, but also how people manage or share their personal data. As this type of
communication...

This thesis will focus on the topic of Selfish Nodes within a Mobile Ad-Hoc Networks (MANET), specifically sensor networks due to their lower power and bandwidth. The approach used is a reputation based algorithm to isolate the selfish nodes from...

This thesis proposes a network based intrusion detection approach using anomaly detection and achieving low configuration and maintenance costs. A honeypots is an emerging security tool that has several beneficial characteristics, one of which is...

This dissertation presents a research whose objective is to design and develop an intrusion detection and response model for Mobile Ad hoc NETworks (MANET). Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without...

Smartphones, loaded with users’ personal information, are a primary computing device for many. Advent of 4G networks, IPV6 and increased number of subscribers to these has triggered a host of application developers to develop softwares that are...

Supervisory Control and Data Acquisition (SCADA) systems are used in almost
all industrial processes including use in the nation's critical infrastructure. The electric,
water, and gas industries are merely a few that rely heavily on the use of...

This thesis lays the groundwork for creation of a graduate-level computer forensics course. It begins with an introduction explaining how computing has invaded modern life and explains what computer forensics is and its necessity. The thesis then...

Remote terminal units (RTUs) are perimeter supervisory control and data acquisition (SCADA) devices that measure and control actual physical devices. Cyber security was largely ignored in SCADA for many years, and the cyber security issues that now...

High dynamic range imaging involves imaging at a bit depth higher than the typical 8-12 bits offered by standard video equipment. We propose a method of imaging a scene at high dynamic range, 14+ bits, to detect motion correlated with changes in...

Draw A Secret password systems have recently come into vogue, primarily in the role of protecting a user’s cellular smart phone from external infiltration in lieu of a password. However, these password systems are only enabled for single touch...